1994-08-30 - CFB description in Schneier

Header Data

From: pstemari@bismark.cbis.com (Paul J. Ste. Marie)
To: cypherpunks@toad.com
Message Hash: c496ef04864d3b3a6e96effee2067d5b82727c775b2b55daa6b44558961c6178
Message ID: <9408302012.AA05838@focis.sda.cbis.COM>
Reply To: N/A
UTC Datetime: 1994-08-30 20:12:43 UTC
Raw Date: Tue, 30 Aug 94 13:12:43 PDT

Raw message

From: pstemari@bismark.cbis.com (Paul J. Ste. Marie)
Date: Tue, 30 Aug 94 13:12:43 PDT
To: cypherpunks@toad.com
Subject: CFB description in Schneier
Message-ID: <9408302012.AA05838@focis.sda.cbis.COM>
MIME-Version: 1.0
Content-Type: text/plain


In the illustration on pg 161 of Schneier's Applied Cryptography
(figure 8.5), the regeneration of bytes to XOR with the cyphertext
stream is shown as using decryption.  Doesn't this require ENcryption
in order to produce the same sequence of XOR bytes that was used in
encypherment? 

	--Paul





Thread